CompTIA Security+ Curriculum Outline

Remote Access and Wireless Security

Overview/DescriptionSecurity professionals are increasingly being made responsible for securing remote and wireless environments. This course examines different remote access strategies and technologies such as PPP, VPNs, PPTP, L2TP, IPsec, RADIUS, and TACACS. This course also examines wireless security mechanisms such as WEP, WPA, CCMP, EAP, PEAP, LEAP, MAC filters, SSID broadcast, and antenna placement and the attacks they are designed to fend off. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience, who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Control Fundamentals and Security Threats

Overview/DescriptionUnderstanding the types of threats that exist in an IT infrastructure is incredibly important when you are attempting to control access to network assets and secure an internetwork environment. This course examines control types, authentication, authorization, and access control strategies, along with the various types of malware, social engineering and spam/phishing attacks that a network can face. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Network Protocols, Attacks, and Defenses

Overview/DescriptionNetwork security professionals must have a firm understanding of the transport mechanisms and attacks faced by traffic entering and exiting a network environment. This course examines the TCP/IP protocol suite, the OSI model, and the different protocols that operate within the layers of these models. This course also examines various attacks that protocols and ports can face, along with the tools that can be used to detect these attacks. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Creating Secure Networks and Performing Security Assessments

Overview/DescriptionSecurity professionals must be able to create secure networking environments using appropriate tools and techniques while also being able to test existing network environments for security weaknesses. This course examines the use of routers and switches to create a secure environment, while also looking at how techniques such as creating subnets, DMZs, and VLANs can be used to secure an environment. This course also examines security assessment techniques and how penetration testing, vulnerability scanning tools, and honeypots can be used to find holes in network security. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day-to-day technical information security experience and who are looking to validate that knowledge. It is recommended that individuals have a minimum of two years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Network and System Security Mechanisms

Overview/DescriptionSecurity professionals must understand the hardware and software mechanisms that can be used to secure a network environment. This course examines the different types of firewalls, NIDS and NIPS, proxy servers, all-in-one security appliances, and other mechanisms that can be put in place to make a network environment secure. This course also discusses mitigation and deterrent techniques, security log analysis, and methods to secure DHCP and DNS servers. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. Its recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Authentication, Biometrics, and Security Controls

Overview/DescriptionSecurity mechanisms and account management are important parts of creating a secure networking environment. This course examines different authentication services and protocols along with biometric security mechanisms and other access security mechanisms such as tokens and smart cards. This course also examines how LDAP can be used to create security in an environment along with risk reduction mechanisms such as policies for mandatory vacations, job rotation and separation of duties. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Securing the IT Environment

Overview/DescriptionSecuring the networking environment is the most important job role that a Security specialist will perform. This course examines the methods, tools, and applications that can be used to secure the data, mobile devices, and operating systems, as well as how to deploy environmental controls and physical access controls. This course looks at locking mechanisms - application and physical - along with encryption schemes for data on servers and mobile devices. This course also examines the different environmental and physical controls that can be used to secure an IT environment. This course helps prepare the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Cryptography and Public Key Infrastructures

Overview/DescriptionGuaranteeing end-to-end security in communication, document, and database infrastructures is incredibly important in internetworking environments. This course examines cryptography and the different algorithms, ciphers and tools that can be used to secure information, and to protect against attacks. Symmetric and asymmetric algorithms are examined, along with block and stream ciphers, one-time pads, and steganography. This course also examines message authentication, digital signatures, Public Key Infrastructures and certification authorization and revocation. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Securing Applications, Virtualized Environments, and Cloud Computing

Overview/DescriptionWeb servers, web applications, virtualization, and cloud computing are becoming standard parts of corporate infrastructures. This course examines the communications standards and protocols that are used in the web server environment, along with the ways to harden web servers and web browsers. This course also examines the different types of attacks that web servers and web-based applications can face. Finally, this course looks at virtualized environments, along with cloud computing and the different types of services and challenges that each can offer. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day-to-day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

Overview/DescriptionBusiness continuity, disaster recovery, and computer forensics go hand in hand when a security professional trains on ways to create, maintain, and repair network security. This course examines business continuity plans along with risk assessment techniques and the strategies used when creating a risk management process. This course also examines security training for end users and the methodologies and tools used when performing computer forensics. This course helps prepares the learner to write the CompTIA Security+ Certification SYO-301.

Target AudienceIndividuals who have day to day technical information security experience who are looking to validate that knowledge. It is recommended that individuals have a minimum of 2 years experience in IT administration with a focus on security and a broad knowledge of security concerns and implementations.

CompTIA Security+ Certification

CompTIA Security+ validates knowledge of communication security, infrastructure security, cryptography, operational security, and
general security concepts. It is an international, vendor-neutral certification that is taught at colleges, universities and
commercial training centers around the world.

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking
experience, with an emphasis on security. Because human error is the number one cause for a network security breach, CompTIA Security+
is recognized by the technology community as a valuable credential that proves competency with information security.

CBT Direct boasts the most beneficial online certification training on the market. With online training, you have the flexibility to
study on your schedule, and with the speed and reliability of the internet, CBT Directís CompTIA Security+ training course is
accessible anywhere you have an internet connection. Convenience finally costs less with CBT Direct Ė the most affordable online
training solution today. CBT Direct is also a member of CompTIA.

CBT Direct also offers online mentoring for over 100 current major certification exams, including CompTIA Security+, for IT
professionals and end-users alike. CBT Directís mentors have a minimum of 20 certifications each and are available 24/7*.* Available for most courses.

Who Benefits from CBT Directís CompTIA Security+ Training?

This training would be beneficial for individuals looking for IT job positions such as; Senior Field Service Engineer, Network
Technician, LAN Administrator, Windows Administrator, Network Security Specialist or Network Security Administrator.

What Professionals Will Learn from CBT Directís CompTIA Security+ Training

CompTIA Security+ Exam SY0-301:
CompTIA Security+ validates your commitment to security. Business owners across all industries want to hire professionals who can
keep their networks secure. A CompTIA Security+ credential on your resume proves to employers your ability to keep their information
safe from network security breaches. Click here to see a detailed curriculum outline.